The Latest in IT Security

Posts Tagged ‘management strategy’

Barr’s comments at a cybersecurity conference mark a continuing effort by the Justice Department to push tech companies to provide law enforcement with access to encrypted devices and applications during investigations. “There have been enough dogmatic pronouncements that lawful access simply cannot be done,” Barr said. “It can be, and it must be.” The attorney […]

Read more ...

The Titan Security Key is designed to help users protect themselves against phishing attacks and account takeover by using FIDO standards for two-factor authentication (2FA). The product uses cryptography to verify the user’s security key and address when they log in to their account. The problem impacts the Bluetooth Low Energy (BLE) version of T1 […]

Read more ...

The notorious Russia-linked threat group known as Sofacy was spotted targeting a government agency in Europe.

Read more ...

Categories

THURSDAY, SEPTEMBER 19, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks